A Review of Secure Data Sharing in Cloud using Key Aggregate Cryptosystem and Decoy Technology
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1
Abstract
Data sharing is an important functionality in cloud storage.I show how to securely, efficiently, and flexibly share data with Decoy technology in secure cloud storage.I describe new public-key cryptosystems which produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the force of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage.So I provide formal security analysis of our schemes in the standard model. I also describe other application of our schemes. In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.
Variance in Performance of AODV Based on Increased Mobility Speed
Variance in Performance of AODV Based on Increased Mobility Speed
A Study to Assess the Level of Burden, Coping Methods and Quality of Life Among Primary Care Givers of Selected Mentally Ill Patients in a Selected Clinic at Salem, Tamil Nadu, India
: Background: Mental illness in a family member affects the family in different ways especially the primary caregiver’s life. This study aimed to assess the level of burden, coping methods and quality of life among prima...
Design and Implementation of an Accidental Fall Detection System for Elderly
With the dramatically increasing of world population, the caring of elderly person becomes a globally concerned problem. The old want an independent living space and their family members need to work, so an intelligent o...
Optimization Performance of a Robot to Reduce Cycle Time Estimate
Optimization Performance of a Robot to Reduce Cycle Time Estimate
A Novel Approach for Encryption of Text Messages, Enhancing the Security of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher, Under 15 Parameters
Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique, Substitution technique. In recent year...